ClamAV < 0.94.2 cli_check_jpeg_exploit() Malformed JPEG File DoS

Medium Nessus Plugin ID 35009

Synopsis

The remote antivirus service is vulnerable to a denial of service attack.

Description

According to its version, the clamd antivirus daemon on the remote host is earlier than 0.94.2. There is a recursive stack overflow involving the JPEG parsing code in such versions. A remote attacker may be able to leverage this issue to cause the application to recursively scan a specially crafted JPEG, which will eventually cause it to crash.

Solution

Upgrade to ClamAV 0.94.2 or later.

See Also

https://bugzilla.clamav.net/show_bug.cgi?id=1266

http://www.nessus.org/u?91209430

Plugin Details

Severity: Medium

ID: 35009

File Name: clamav_0_94_2.nasl

Version: 1.16

Type: remote

Published: 2008/12/03

Updated: 2018/07/06

Dependencies: 11153

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS v2.0

Base Score: 5

Temporal Score: 3.9

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:clamav:clamav

Required KB Items: Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Reference Information

CVE: CVE-2008-5314

BID: 32555

Secunia: 32926

CWE: 399